European HPC cluster abuse | ISG.EE Service Status
... be determined, none of the files indicating being compromised have been found on our file systems ... purposes. The D-ITET Slurm and SGE clusters have not been compromised. We are monitoring the situation ... could be determined, none of the files indicating being compromised have been found on our file systems ... purposes. The D-ITET Slurm and SGE clusters have not been compromised. We are monitoring the situation ...
Worms in our network
... workstations in ETHZ are compromised by the W32.Blaster / Lovesan Worm. This weekend, the worm will attack ... workstations in ETHZ are compromised by the W32.Blaster / Lovesan Worm. This weekend, the worm will attack ...
Publication – Center for Security Studies | ETH Zurich
... of the CWC remains compromised by needed but absent members and a weak inspections regime. Download ... effectiveness of the CWC remains compromised by needed but absent members and a weak inspections regime ...
Isolation and Recovery for Secure SDN – ZISC
... . In particular, in current SDN designs a single compromised component can affect the whole SDN network ... (due to its centralized architecture), and these designs also do not allow recovery of compromised ... particular, in current SDN designs a single compromised component can affect the whole SDN network (due to ... its centralized architecture), and these designs also do not allow recovery of compromised components ...
https://people.inf.ethz.ch/rsasse/pub/eccdaa-eurosp19.abstract.txt
... expected authentication and secrecy properties for all TPMs even if only one is compromised. We propose and ... expected authentication and secrecy properties for all TPMs even if only one is compromised. We propose and ...
https://people.inf.ethz.ch/rsasse/pub/sok-delegation-eurosp20.abstr...
... The ability to quickly revoke a compromised key is critical to the security of any public-key ... The ability to quickly revoke a compromised key is critical to the security of any public-key ...
Local Root Exploit in Linux 2.6.13 to 2.6.17.3
... compromised using a compromised developer account and CVE-2006-2451 . This means that this vulnerability is ... on the Debian News list , the Debian.org computer gluck was compromised using a compromised developer ...
Security of Medical Devices – System Security Group | ETH Zurich
... other parts of the system being compromised. Syssec members on the project: Kasper Bonne Rasmussen ... -schedule execution of critical applications that are running on a partially compromised system - we call ... applications despite other parts of the system being compromised. Syssec members on the project: Kasper Bonne ... of critical applications that are running on a partially compromised system - we call this trusted ...
Tesseract – System Security Group | ETH Zurich
... compromised or acts maliciously. In contrast, decentralized exchanges are “trustless” (i.e. don’t require ... manipulation if the operator is compromised or acts maliciously. In contrast, decentralized exchanges are ...
https://people.inf.ethz.ch/rsasse/pub/GUISecurity.abstract.txt
... measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ... measures are insufficient if the integrity of the human-computer interface is compromised. GUI logic flaws ...
